I examine a hypothetical scenario of a growing medium size company that is planning to migrate to a cloud environment. I suggest an Amazon AWS cloud service as a possible solution and also cover deployment models as well as some very high-level implementation details and benefits of cloud PaaS services. [Read more…]
In early days of Cloud computing, media frequently probed and disputed the viability of cloud computing. And not so long ago, in 2009, even the most famous futurists were skeptical. Jamais Cascio, who listed as one of the 2009 Top 100 Global Thinkers said, “I have to admit it: I’m not a huge fan of the cloud computing concept.”(Fast Company, 2009). However, not even a decade later, the positive impact of cloud computing can no longer be disputed. With that, a new concern comes to view, the likelihood of Cloud computing becoming a monopolized technology. This article is a brief look at the current landscape of cloud computing relative to becoming a monopoly. [Read more…]
In 2015, the worldwide SaaS market was valued at approximately US $80 billion. According to Forbes magazine, “by 2020, it will grow by estimated 69% to become over $130-billion-dollar industry” (Forbes.com, 2017). The incredibly fast rate at which SaaS adoption grows is primarily the result of a very positive attitude towards ‘software as a service’ model among businesses of all sizes. The following post introduces one of such SaaS technologies, called ‘SendGrid Email.’ [Read more…]
Wikis are a type of website or online application that is a result of a collaboration of a community of experts that add and edit online content dedicated to a variety of highly specific topics. [Read more…]
The following post talks about the current trend of transitioning to cloud infrastructures, in which majority of businesses favor agility offered by the cloud service solutions instead of true costs benefits associated with moving to the cloud. Peter Drucker, an educator, and management consultant once stated: “Profit for a company is like oxygen for a person. If you do not have enough of it, you are out of the game. But if you think your life is about breathing, you are really missing something.” (AZQuotes, 2017).
Compliance is a significant part of safeguarding a secure business environment in the cloud. In this post, I propose my opinion on what is likely the best course of action to achieve compliance for the small CSP. [Read more…]
Right from the early days of cloud, the overall security of cloud solutions has been one of the biggest roadblocks to adoption of cloud. Potential cloud customers are usually concerned primarily about the security of the data stored off premises, but there are many other security issues to consider. [Read more…]
When it comes to SaaS applications, enterprises can select whether they want to use subscription model (hosted online) or bring the SaaS application and host it on their own infrastructure. The following post explores the main differences, advantages, and disadvantages of both hosting approaches. [Read more…]
The development of mobile technologies now regularly occurs by leveraging cloud applications. The purpose of this post is to explore the cloud computing and how it enables the development of smart mobile technologies. [Read more…]
All of us recognize the biggest cloud brands such as Amazon, Microsoft, and Google. However, some of us who tried the cloud solutions also feel that the AWS console feels bloated and hard to understand, that Microsoft’s Azure offers eye candy over functionality, or that Google’s Developer Console is not doing anyone favor by being somewhere in between. To be honest, the cloud management consoles of the most deep-pocket cloud providers became too complicated and in the process of growth lost their user friendliness. Perhaps with the exception of Amazon LightSail (newly announced service), a straightforward deployment of a cloud-based distributed infrastructure is no longer a domain of the above mention cloud giants. [Read more…]
There are numerous ways in which enterprises can leverage the cloud computing services. Each of the cloud computing service models come with its own advantages, and the variety of options as well as the elasticity in all service tiers is one of the primary reasons why cloud computing is becoming so popular. However, given the many options, it is vital for the enterprises also to be aware of certain drawbacks of cloud computing deployment and service models. In this posts, I outline one use case for each of the cloud computing service models, namely for the IaaS, PaaS or SaaS and see their applicability to different cloud deployment models. [Read more…]
Have you ever wondered what makes the service a ‘cloud’ application? Or alternatively, how does any app become cloud based? The following article dives a little deeper into this often-asked questions and explores some of the characteristics and criteria of the cloud. To illustrate the point, I examine two well-known public services (Airbnb and Spotify) and analyze the ‘cloud application’ sticker and its merit used often with these two these online services. [Read more…]
The following article explores the technological convergence of Intelligent Personal Assistant (IPA). More specifically, it analyzes the emerging technology of Smart Voice-Enabled Wireless Speakers and how the IPA technology transitioned from smartphones to built-in, dedicated home devices. The trend is changing the way in which machine learning and artificial intelligence are used, and the article explores the new and evolving technology in the context of its overall social impact. [Read more…]
The following article analyses how anonymization methods and various other obfuscation techniques fare in their undertaking to defend against the privacy concerns. [Read more…]
Nowadays, it is the volume, velocity, veracity and variety of Big Data that are the primary factors and true amplifiers of the security issues experienced in the large-scale cloud infrastructures. The upsurge in security issues in Big Data installations is predominantly driven by an overall increase in volume and velocity of the data. However, dealing with the diversity of data sources (variety of data) is quickly becoming yet another of the pressing security concerns and the existence of enormous amounts of data is no longer the single factor creating the new security challenges. Data variety is one of the newest security challenges of Big Data infrastructures.